- Lesson 1: Assessing Cybersecurity Risk
- Importance of Risk Management
- Assessing Risk
- Mitigating Risk
- Integrating Documentation into Risk Management
- Lesson 2: Analyzing the Threat Landscape
- Classifying Threats
- Analyzing Trends Affecting Security Posture
- Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments
- Implementing Threat Modeling
- Assessing the Impact of Reconnaissance
- Assessing the Impact of Social Engineering
- Lesson 4: Analyzing Attacks on Computing and Network Environments
- System Hacking Attacks
- Web-Based Attacks
- Malware
- Hijacking and Impersonation Attacks
- DoS Incidents
- Mobile Security Threats
- Cloud Security Threats
- Lesson 5: Analyzing Post-Attack Techniques
- Command and Control Techniques
- Persistence Techniques
- Lateral Movement and Pivoting Techniques
- Data Exfiltration Techniques
- Anti-Forensics Techniques
- Lesson 6: Assessing the Organization’s Security Posture
- Cybersecurity Auditing
- Vulnerability Management Plan
- Assessing Vulnerabilities
- Conducting Penetration Testing
- Lesson 7: Collecting Cybersecurity Intelligence
- Security Intelligence Collection and Analysis Platform
- Network-Based Intelligence Sources
- Host-Based Intelligence Sources
- Lesson 8: Analyzing Log Data
- Common Tools for Log Analysis
- SIEM Tools for Analysis
- Lesson 9: Performing Active Asset and Network Analysis
- Analyzing Incidents with Windows-Based Tools
- Analyzing Incidents with Linux-Based Tools
- Indicators of Compromise
- Lesson 10: Responding to Cybersecurity Incidents
- Incident Handling and Response Architecture
- Mitigating Incidents
- Handing Over Incident Information to a Forensic Investigation
- Lesson 11: Investigating Cybersecurity Incidents
- Forensic Investigation Plan
- Securely Collecting and Analyzing Electronic Evidence
- Following Up on Investigation Results